Abstract is missing.
- Multi-service Oriented Broadcast EncryptionShaoquan Jiang, Guang Gong. 1-11 [doi]
- Secure and Insecure Modifications of the Subset Difference Broadcast Encryption SchemeTomoyuki Asano. 12-23 [doi]
- Linear Code Implies Public-Key Traitor Tracing with RevocationVu Dong Tô, Reihaneh Safavi-Naini. 24-35 [doi]
- TTS without Revocation Capability Secure Against CCA2Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee. 36-49 [doi]
- Single Database Private Information Retrieval with Logarithmic CommunicationYan-Cheng Chang. 50-61 [doi]
- Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and ConstructionsGoichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Anderson C. A. Nascimento, Akira Otsuka, Andreas Winter. 62-73 [doi]
- Optimistic Fair Exchange Based on Publicly Verifiable Secret SharingGildas Avoine, Serge Vaudenay. 74-85 [doi]
- NGSCB: A Trusted Open SystemMarcus Peinado, Yuqun Chen, Paul England, John Manferdelli. 86-97 [doi]
- The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH CiphersJorge Nakahara Jr., Bart Preneel, Joos Vandewalle. 98-109 [doi]
- Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2YongSup Shin, Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee. 110-122 [doi]
- The Related-Key Rectangle Attack - Application to SHACAL-1Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee, Dowon Hong. 123-136 [doi]
- Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1Youngdai Ko, Changhoon Lee, Seokhie Hong, Sangjin Lee. 137-148 [doi]
- The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal OrdersMichael J. Jacobson Jr.. 149-156 [doi]
- Analysis of a Conference Scheme Under Active and Passive AttacksFeng Bao. 157-163 [doi]
- Cryptanalysis of Two Password-Authenticated Key Exchange ProtocolsZhiguo Wan, Shuhong Wang. 164-175 [doi]
- Analysis and Improvement of Micali s Fair Contract Signing ProtocolFeng Bao, Guilin Wang, Jianying Zhou, Huafei Zhu. 176-187 [doi]
- Digital Signature Schemes with Domain Parameters: Yet Another Parameter Issue in ECDSASerge Vaudenay. 188-199 [doi]
- Generic Construction of Certificateless SignatureDae Hyun Yum, Pil Joong Lee. 200-211 [doi]
- Pseudorandomness of SPN-Type TransformationsWonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai. 212-223 [doi]
- How to Re-use Round Function in Super-Pseudorandom PermutationTetsu Iwata, Kaoru Kurosawa. 224-235 [doi]
- How to Remove MAC from DHIESKaoru Kurosawa, Toshihiko Matsuo. 236-247 [doi]
- Symmetric Key Authentication Services RevisitedBruno Crispo, Bogdan C. Popescu, Andrew S. Tanenbaum. 248-261 [doi]
- Improvements to the Point Halving AlgorithmBrian King, Ben Rubin. 262-276 [doi]
- Theoretical Analysis of XL over Small FieldsBo-Yin Yang, Jiun-Ming Chen. 277-288 [doi]
- A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel AttacksChae Hoon Lim. 289-300 [doi]
- A Mobile Agent System Providing Offer PrivacyMing Yao, Matthew Henricksen, Greg Maitland, Ernest Foo, Ed Dawson. 301-312 [doi]
- Identity-Based Strong Designated Verifier Signature SchemesWilly Susilo, Fangguo Zhang, Yi Mu. 313-324 [doi]
- Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract)Joseph K. Liu, Victor K. Wei, Duncan S. Wong. 325-335 [doi]
- A Group Signature Scheme with Efficient Membership Revocation for Reasonable GroupsToru Nakanishi, Yuji Sugiyama. 336-347 [doi]
- Convertible Nominative SignaturesZhenjie Huang, YuMin Wang. 348-357 [doi]
- Protocols with Security Proofs for Mobile ApplicationsYiu Shing Terry Tin, Harikrishna Vasanta, Colin Boyd, Juan Manuel González Nieto. 358-369 [doi]
- Secure Bilinear Diffie-Hellman BitsSteven D. Galbraith, Herbie J. Hopkins, Igor Shparlinski. 370-378 [doi]
- Weak Property of Malleability in NTRUSignSungJun Min, Go Yamamoto, Kwangjo Kim. 379-390 [doi]
- Information Security Risk Assessment, Aggregation, and MitigationArjen K. Lenstra, Tim Voss. 391-401 [doi]
- A Weighted Graph Approach to Authorization Delegation and Conflict ResolutionChun Ruan, Vijay Varadharajan. 402-413 [doi]
- Authorization Mechanisms for Virtual Organizations in Distributed Computing SystemsXibin Zhao, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun. 414-426 [doi]
- Unconditionally Secure Encryption Under Strong AttacksLuke McAven, Reihaneh Safavi-Naini, Moti Yung. 427-439 [doi]
- ManTiCore: Encryption with Joint Cipher-State AuthenticationErik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson. 440-453 [doi]
- On Security of XTR Public Key Cryptosystems Against Side Channel AttacksDong-Guk Han, Jongin Lim, Kouichi Sakurai. 454-465 [doi]
- On the Exact Flexibility of the Flexible Countermeasure Against Side Channel AttacksKatsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume. 466-477 [doi]
- Fault Attacks on Signature SchemesChristophe Giraud, Erik Woodward Knudsen. 478-491 [doi]